CN102833296B - Method and apparatus for building safe computing environment - Google Patents

Method and apparatus for building safe computing environment Download PDF

Info

Publication number
CN102833296B
CN102833296B CN201110166629.XA CN201110166629A CN102833296B CN 102833296 B CN102833296 B CN 102833296B CN 201110166629 A CN201110166629 A CN 201110166629A CN 102833296 B CN102833296 B CN 102833296B
Authority
CN
China
Prior art keywords
tbs
computing environment
information
protected
protected application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110166629.XA
Other languages
Chinese (zh)
Other versions
CN102833296A (en
Inventor
杨子夜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
EMC Corp
Original Assignee
EMC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by EMC Corp filed Critical EMC Corp
Priority to CN201110166629.XA priority Critical patent/CN102833296B/en
Publication of CN102833296A publication Critical patent/CN102833296A/en
Application granted granted Critical
Publication of CN102833296B publication Critical patent/CN102833296B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

Embodiments of the present invention are related to the method and apparatus for building safe computing environment.A kind of method for building safe computing environment on the computing device is disclosed, which is guided by credible bootable storage device TBS, including:It is communicated with remote validation device RV to verify the computing environment guided by TBS, and receives the security strategy generated by RV;The running space of isolation is created in a computing environment for running protected application;And security strategy is applied to protected application during the operation of protected application.A kind of method for verifying the safety of the computing environment built on the computing device is also disclosed, which is guided by TB S, including:It is communicated with TBS to verify the computing environment guided by TB S;Security strategy is generated in response to being proved to be successful, security strategy will be applied in protected application during the operation of protected application in a computing environment;And the security strategy generated to TBS transmission.In addition corresponding equipment is also disclosed.

Description

Method and apparatus for building safe computing environment
Technical field
Embodiments of the present invention relate generally to information technology field, more particularly, to by build it is safe based on The method and apparatus for calculating environment.
Background technology
With the development of computing technique, it is ensured that the safety of computing environment has become an important technology urgently to be resolved hurrily Problem.Term " safety " as used herein refers to avoiding application in computing environment, process/thread, file, data, code Etc. various information by it is any it is unwarranted in a manner of be accessed (for example, by Malware, virus and/or worm access), Integrality and/or privacy to avoid above- mentioned information are destroyed.As an example, being related to bank, finance, financial accounting, individual The application of privacy information etc. usually has high requirement to safety.Therefore, safe computing environment is built with important Meaning.
In order to build the computing environment of a safety on given computing device, it usually needs ensure computing environment with it is outer Portion is isolated.Currently, virtual machine (VM) has been widely used as isolation platform, in the application by between each virtual machine Natural separation provides security isolation.For example, credible bootable storage device (Trusted Bootable can be passed through Storage, TBS) build such secured computing environment.TBS is a kind of storage device with guiding function, for example, it It can be analogous to the portable memory apparatus of universal serial bus (Universal Serial Bus, USB) equipment.In TBS In, generally comprise oneself operating system (OS) mirror image (that is, virtual machine), manager (for example, monitor of virtual machine, VMM) And file system.When such TBS equipment is coupled with computing device (for example, personal computer PC), which can be set It is standby to guide, to build a computing environment based on virtual machine on the hardware platform of the computing device.
However, it will be understood by those skilled in the art that operating system itself can be utilized as attack source, in this feelings Under condition, such as the direct I O access that passes through peripheral equipment, so that it may to break up this isolation built by virtual machine.Therefore, empty Isolation between quasi- machine can not form real security isolation.
To solve the above-mentioned problems, it has been proposed that trusted using the software for including in TBS and calculate base (Software Trusted Computing Base, STCB) further ensure that the safety of isolated computing environment, STCB will be explained below. In addition, in order to further increase the safety of computing environment, it is also proposed that be customized to operating system (OS) mirror image/kernel, example Such as remove useless device drives.It is equipped with internal security processor (for example, arm processor) side of being also known for computing environment One of case.It is also known that another kind of scheme be:By the third party outside computing device to the meter that is built on the computing device It calculates environment to be verified, meets scheduled security requirement or strategy to ensure it when being created.
Although the scheme of the prior art can improve the safety of computing environment to a certain extent, certain problems and Defect still has to be solved.First, in the above prior art, it is typically only capable to ensure that computing environment is peace in structure and startup Complete, and it is unable to ensure the peace of the application for wishing to be protected or process (hereinafter referred to as " protected application ") during runtime Quan Xing.In addition to this, merely ensure that the safety of computing environment may be not dependent on STCB or third-party authentication one Profit, because STCB or third party itself may also can not execute correct authentication function due to by attacking.In view of this, In the art, a kind of improved technical solution for building secured computing environment is needed.
Invention content
In one aspect of the invention, a kind of method for building safe computing environment on the computing device is provided, The computing device is guided by credible bootable storage device TBS.This method includes:It is communicated with remote validation device RV to verify by institute The computing environment of TBS guiding is stated, and receives the security strategy generated by the RV;Isolation is created in the computing environment Running space is for the protected application of operation;And the security strategy is applied during the operation of the protected application In the protected application.
Optional embodiment according to the present invention is communicated with remote validation device RV to verify the calculating guided by the TBS Environment may further include:It is verified to RV transmission about the information of the TBS.In such an embodiment, Information about the TBS may include following one or more:The identification information of the TBS, the operation for including in the TBS The information of system image, the information for the monitor of virtual machine mirror image for including in TBS, the letter for the file system for including in the TBS Breath, the information of protected application.
Optional embodiment according to the present invention, this method may further include:Make it is described it is protected application with it is described Communication between the external service of computing environment is controlled by the RV.In such an embodiment, make the protected application Communication between the external service of the computing environment is controlled by the RV and may further include:Make the protected application To RV transmission for the request of the external service;And in response to the request by the RV good authentications, make described Protected apply communicates under the guiding of the RV with the external service.
In another aspect of this invention, a kind of safety for verifying the computing environment built on the computing device is provided Method, which is guided by credible bootable storage device TBS.This method includes:Communicated with the TBS with verify by The computing environment of the TBS guiding;Security strategy is generated in response to described be proved to be successful, the security strategy will be in the meter It is applied in the protected application during the operation for calculating the protected application in environment;And generated to TBS transmission The security strategy.
Optional embodiment according to the present invention is verified the computing environment guided by the TBS and be may further include:It connects Receive the information about the TBS;And the computing environment is verified based on the described information received.In such reality It applies in mode, the information about the TBS may include following one or more:The identification information of the TBS, in the TBS Including operating system mirror image information, the information for the monitor of virtual machine mirror image for including in TBS, the text for including in the TBS The information of part system and the information of protected application.
Optional embodiment according to the present invention, this method may further include:Control the protected application and institute State the communication between the external service of computing environment.In such an embodiment, the protected application and the meter are controlled The communication calculated between the external service of environment may further include:The protected application is received for the external service Request;The protected application is verified;And in response to being proved to be successful to the protected application, guiding it is described by Protection application is communicated with the external service.
In still another aspect of the invention, a kind of equipment for building safe computing environment on the computing device is provided, The computing device is guided by credible bootable storage device TBS.The equipment includes:Communication device, is configured to and remote validation Device RV is communicated to verify the computing environment guided by the TBS, and for receiving the security strategy generated by the RV;Operation Space creating device is configured to create the running space of isolation in the computing environment for running protected application; And strategy implement device, be configured to during the operation of the protected application by the security strategy be applied to it is described by Protection application.
Optional embodiment according to the present invention, communication device may further include:It is configured to transmit to the RV About the TBS information for verification device.In such an embodiment, the information about the TBS may include Following one or more:The identification information of the TBS, the information for the operating system mirror image for including in the TBS include in TBS Monitor of virtual machine mirror image information, the information for the file system for including in the TBS and the information of protected application.
Optional embodiment according to the present invention, the equipment may further include:Application management device is configured to make Communication between the protected application and the external service of the computing environment is controlled by the RV.In such embodiment In, the application management device may further include:It is configured to that protected apply to RV transmission is made to be directed to institute State the device of the request of external service;And it is configured to make described protected by the RV good authentications in response to the request Shield applies the device communicated with the external service under the guiding of the RV.
In another aspect of this invention, a kind of safety for verifying the computing environment built on the computing device is provided Validator, the computing device is guided by credible bootable storage device TBS, and the validator is located in the calculating Equipment it is long-range.The validator includes:Remote validation device, is configured to communicate with the TBS and is guided by the TBS with verifying Computing environment;Strategy generating device is configured to generate security strategy in response to described be proved to be successful, the security strategy The protected application will be applied in during the operation of protected application in the computing environment;And strategy transmission dress It sets, is configured to the security strategy generated to TB S transmission.
Optional embodiment according to the present invention, remote validation device may further include:Be configured to receive about The device of the information of the TBS;And be configured to verify the computing environment based on the described information received Device.In such an embodiment, the information about the TBS may include following one or more:The mark of the TBS Information, the information for the operating system mirror image for including in the TBS, the information for the monitor of virtual machine mirror image for including in TBS are described The information for the file system for including in TBS and the information of protected application.
Optional embodiment according to the present invention, the validator may further include:Application control device, is configured to Control the communication between the external service of the protected application and computing environment run in the computing environment.In addition, answering It may further include with control device:It is configured to receive the dress of request of the protected application for the external service It sets;It is configured to the device verified to the protected application;And it is configured in response to the protected application Be proved to be successful and guide and described protected apply the device that is communicated with the external service.
By reading the detailed description below in conjunction with attached drawing, it will be understood to those of skill in the art that utilizing the reality of the present invention Mode is applied, the safety of computing environment can be protected in terms of multiple and different with angle.First, in structure computing environment When, pass through the verification of third party (that is, remote validation device RV), it can be ensured that the calculating guided on given computing device by TBS Environment be not under fire or invasion secured computing environment.In other words, the startup of computing environment is safe.Secondly, in institute's structure In the computing environment built, the isolation running space for protected application can be created, to fight possible outside invasion.It is preferred that Ground, the isolation running space can be created and be safeguarded by the monitor of virtual machine (for example, STCB) in TBS.On this basis, It is applied being loaded during running space is isolated since protected, the behavior in whole life cycle all will be by by long-range The constraint for the security strategy that authentication RV is generated, protected application implementation of the security strategy from TBS into isolation running environment. Finally, optionally, when protected application is interacted or communicated with the external service except computing environment during runtime When, which still will undergo the additional identification of RV.
It will be understood that by the detailed description below in conjunction with attached drawing, according to the embodiment of the present invention, will not only create With the safety of computing environment is ensured when starting, and (especially in itself and outside during the whole service of protected software When communication for service) it may be by the implementation of security strategy and additional third-party authentication and ensure the safety of computing environment.With This mode, when remote validation, isolation running space when being started by the way that computing environment is used in combination are to the operation of protected application Protection and the local of telesecurity strategy are implemented, and the safety of computing environment is can effectively improve.
Description of the drawings
Detailed description below, above-mentioned and other purposes, the feature of embodiment of the present invention are read by reference to attached drawing It will become prone to understand with advantage.In the accompanying drawings, several implementations of the present invention are shown by way of example rather than limitation Mode, wherein:
Fig. 1 shows the method for building safe computing environment on the computing device according to embodiment of the present invention 100 flow chart;
Fig. 2 shows the safety for verifying the computing environment that builds on the computing device according to embodiment of the present invention The flow chart of the method 200 of property;
Fig. 3 shows the equipment for building safe computing environment on the computing device according to embodiment of the present invention 300 block diagram;
Fig. 4 shows the safety for verifying the computing environment built on the computing device according to embodiment of the present invention The block diagram of the validator 400 of property;
Fig. 5 shows the block diagram of the exemplary system 500 according to embodiment of the present invention;And
Fig. 6 shows the block diagram of the exemplary computer device 600 suitable for being used in combination with embodiments of the present invention.
Specific implementation mode
Below with reference to the accompanying drawings detailed description of the present invention embodiment.It is as outlined above and discussed in more detail below, In an embodiment of the invention, it can ensure to set in calculating using credible bootable storage device (TBS) from many aspects The safety of the computing environment of standby upper structure.
Before describing embodiments of the present invention, the definition of several terms is provided first.Term as used herein " calculates Environment " refers to the environment run wherein for program.One computing environment includes mainly two aspects:Hardware environment and software loop Border.Hardware environment is mainly made of central processing unit (CPU), memory, bus, I/O equipment and certain peripheral equipments.It is soft Part environment is primarily referred to as the environment of application program operation, including a series of software stacks established from hardware, including but unlimited In:Monitor of virtual machine (Virtual Machine Monitor, VMM), operating system (OS), middleware, system service journey Sequence, etc..
In addition, the credible bootable storage device (TBS) of term as used herein refers to a kind of storage device, when it is connected When to an external physical computing device, the computing device can be guided using its internal storage device, to utilize The physical hardware platform of the computing device builds a computing environment.As described above, TBS generally comprise oneself OS mirror images, Manager (for example, VMM) and file system.In addition, TBS may be fitted with non-breakable cipher engine, such as credible peace Full console module (Trusted Platform Module, TPM) or the token engine similar to RSA, should to generate mark The information of TBS identity, this is only several examples.Common TBS can be implemented as the portable device of USB device etc, so And this is merely exemplary and not limiting.Particularly, it should be understood that guide the computing environment of structure only using TB S Using the hardware in other words based on physical computing devices, and it is unrelated with the operating system and software application installed or run thereon.
In addition, term " application " used herein indicate any software that can be run in a computing environment, program instruction, Process and/or thread.Also include Client application using both including system application.Correspondingly, term " protected application " refer to by It is ensured during operation and is not applied by other Malware infringements in the more demanding of safety.
In the following, detailed description of the present invention principle and essence will be come in conjunction with several illustrative embodiments shown in the accompanying drawings God.Referring initially to Fig. 1, it illustrates be used to build safe computing environment on the computing device according to embodiment of the present invention Method 100 flow chart.Note that each step described in method 100 can execute and/or parallel in a different order It executes.Method 100 can also include the steps that additional step and/or omission execution are shown.The scope of the present invention is in this regard It is unrestricted.
Method 100 is executed in TBS/ computing devices side.Particularly, method 100 can be in response to TBS to computing device It guides and executes.It is appreciated that in response to the guiding of TBS, on the hardware environment of the computing device, software environment will be created It builds.The software environment at least may include:Operating system OS, software trust calculate base STCB.Software environment and hardware environment one It rises and constitutes the computing environment guided by TBS
After method 100 starts, in step S102, communicated with remote validation device RV to verify the calculating ring guided by TBS Border, and receive the security strategy generated by the RV.Remote validation device RV is located in computing device and the remote location of TBS Any appropriate entity, the computing environment for being configurable to guide TBS is verified, and (this is detailed below with regard to Fig. 2 It states).
It will be understood to those of skill in the art that whether the computing environment guided is credible or safe, largely Depending on guiding the TBS of computing device whether credible or safe.Therefore, according to the preferred embodiment of the present invention, RV is to meter The verification of environment is calculated based on the information about TB S.In such an embodiment, the letter about TBS can be sent to RV Breath, it is including but not limited to following one or more:The identification information of TBS, management program (that is, VMM) mirror image for including in TBS Information, the information for the OS mirror images for including in TBS, the information for the file system for including in TBS, and run in isolation running space Protected application information, etc..
According to the embodiment of the present invention, the part as computing environment verification can be come using the identification information of TBS Verify the identity of the TBS.For example, TBS identification informations can be related to unique sequence numbers associated with the TBS and prove this only The key of one sequence number.The unique sequence numbers such as can by TBS in the token engine of TPM or RSA etc that is equipped with To generate.Meanwhile underground key is also stored with inside TBS, such as the private key in public key cryptosyst (PKI).In general, private key It is underground, and the unique sequence numbers of TBS and public key corresponding with private key are disclosed.It is possible thereby to uniquely determine The identity of TBS.Alternatively or additionally, in certain other embodiments, TBS identification informations can be related to fixed key with And the key digital of dynamic change.At this point it is possible to verify the identity of TBS using " dual factors " (two-factor) mechanism.With On enumerate is only several examples, any TBS identification informations appropriate and TBS authentication means each fall within the model of the present invention Within enclosing.
Correspondingly, the advance agreement negotiated or followed jointly according to TBS and RV about certification can preserve at RV About it is legal or certification TBS for information about and TBS should meet it is corresponding constraint (for example, for OS mirror images, VMM mirrors The constraint, etc. of picture and/or file system).If transmitted information and the information match and corresponding preserved at RV Constraint is met, then RV being proved to be successful for the TBS computing environment guided.
It should be appreciated that other than the information about TBS or alternatively, RV guide TBS the verification of computing environment It is also conceivable to other factors.For example, according to some embodiments of the present invention, verification process can be based on currently used be somebody's turn to do Other verification informations for the information of the physical computing devices that the information of the user of TBS, TBS are guided, dynamic/generate at random, etc. Deng.The scope of the present invention is not limited in this respect.
As described below, as RV to computing environment when being proved to be successful, in response, RV will be generated to be calculated for current Security strategy in environment.Such security strategy can be predefined, and/or according to the design parameter of current computing environment And dynamic generates.According to some embodiments of the present invention, the security strategy that RV is generated may include for application output communication Limitation, such as protected apply is forbidden to access hostile network address after under attack, reveal information to unauthorized party, etc. Deng.This is only example, other any security strategies appropriate are all feasible.Moreover, the security strategy that RV is generated can be General, it can also be specific to protected security application, this will be explained below.The security strategy generated is from RV to the sides TBS It sends, and is received at step S 102.
In certain preferred embodiments, in step S 102, the software in the computing environment that TBS is guided can be utilized Trusted computing base (STCB) executes the communication with RV and the reception of security strategy.Term " software trust meter as used herein Calculation base " (STCB) is the highest application of permission in the computing environment that TBS is guided, i.e. privilege application.Once STCB is in general, TBS To generate computing environment, STCB is loaded guiding computing device.For example, in some embodiments, STCB may be implemented For a part of monitor of virtual machine VMM or VMM.
It should be noted that with RV communicating and receive security strategy using STCB may insure the safety of the operation and reliable Property, but this it is not necessary to.Indeed, it is possible to utilize any hardware, software and/or firmware in TBS and/or computing device Module realizes that the function of step S 102, the scope of the present invention are not limited in this respect.
It is further noted that in step S 102, the communication between STCB and RV, which can utilize, to be currently known or opens in the future The various wired and/or wireless communication mechanism of hair is realized.The scope of the present invention is also unrestricted in this regard.
Next, method 100 proceeds to step S104, here, creating the operation of isolation in the computing environment of TBS guiding Space is for the protected application of operation.As described above, after it TBS connections or will be coupled to certain computing device, TBS can To guide the computing device using its storage inside, to build a computing environment on its hardware platform.In the meter It calculates in environment, in order to ensure the safety of protected application, the isolation running space of protected application operation can be created for.This The running space of class isolation can fight the invasion and destruction of Malware, and can include that (random access stores to RAM Device) in code/data protection and for I/O (input/output) protection.
It should be appreciated that operation and subsequent telesecurity strategy of the establishment of isolation running space for protected application Implementation plays an important roll.According to the preferred embodiment of the present invention, isolation running space for example can by following steps come It creates:Initialize protected application;The dynamic computing environment of the protected application is controlled to prevent from illegally using;Prison The use for controlling memory management unit (MMU) carries out insulation blocking to the storage space of protected application;And monitoring is defeated Enter/the use of output storage administrative unit (IOMMU), to peripheral equipment by IOMMU carry out between protected application Interactive operation controlled.Particularly, such isolation running space can be created by STCB.Present applicant in In 08 month 2010 Chinese invention patent application number 201010262383.1 submitted for 25th, it is described in detail and is created using STCB The principle of such isolation running space and realization.It is incorporated by reference into all the contents of the application herein.
It should be appreciated that be only exemplary using STCB to create the running space of isolation, and not in any way It limits the scope of the invention.Indeed, it is possible to drawn using any proper technology means for being currently known or developing in the future The running space of isolation is built in the computing environment led.
Then, it at the step S 106 of method 100, during the operation of protected application, will be received at step S104 , by RV generate security strategy be applied to protected application.Note that term as used herein refer to " during operation " using from It is loaded the whole life cycle started until end of run.
According to the preferred embodiment of the present invention, the implementation of security strategy can be realized using the STCB in TBS.It can be with Understand, as described above, STCB is the highest privilege application of permission in TBS, and the isolation operation for running protected application is empty Between can be built by STCB.Thus, for example STCB is advantageous to implement the security strategy of RV settings.
In certain optional embodiments of the present invention, method 100 then proceeds to optional step S108.In optional step Rapid S108 makes the protected application of each of computing environment be controlled by far with the communication between the external service except the computing environment Journey validator RV.It is appreciated that in the operational process of a protected application, it may be needed and the clothes outside computing environment Business (as an example, back-end server, etc. in cloud computing) is communicated.At this point, the exchange due to being related to information, having can It can destroy the safety of computing environment.For this purpose, optional embodiment according to the present invention, these protected applications and external service Communication to receive the control and supervision of remote validation device RV.
According to the preferred embodiment of the present invention, the protected application in computing environment and the communication between external service with RV is intermediary, and is controlled by it.For example, in some embodiments, step S108 can include these following sub-steps.It is first First, when protected application is wished to be communicated with external service, it is made to be directed to the external service to the RV transmission of remote validation device Request, rather than directly communicated with the applications.RV will carry out a series of verification behaviour upon receipt of the request Make, this will be explained below.If be proved to be successful, in the sides TBS, protected application can under the guiding of RV with external service Communication.For example, in response to being proved to be successful, RV can allow protected application to be directly connected to applications and exchange information.
In the present invention, RV can differently hold protected application with the verification communicated between external service Row.For example, in some embodiments, it is protected to apply the verification that RV is all had to pass through with any communication of external service.It is standby Selection of land only can carry out intermediary's verification when a protected application communicates for the first time with an external service by RV.In addition, RV Such verification might also depend on the various factors such as period, the feature of external service and information.
It should be appreciated that it is above-described using RV as it is protected application and the intermediary between external service, only with RV controls the preferred embodiment communicated therebetween.Other embodiment is equally possible.For example, in certain alternative implementations In mode, protected application can be communicated according to the preset rules of RV with external service.The scope of the present invention exists It is unrestricted in this respect.
According to the method 100 described above with reference to Fig. 1, local mechanism (for example, STCB) and long-range mechanism can be utilized (RV) coordination between and cooperation, to ensure the safety of the protected application in guided computing environment.Furthermore, it is possible to manage Solution, different from only safety is verified and checked when computing environment is built and is started in the prior art, according to the present invention Embodiment, security strategy will be carried out in the whole life cycle of protected software application.Particularly, protected application Communication between external service may also pass through additional verification.Remote validation when being started as a result, by computing environment, every The local implementation of establishment and telesecurity strategy in running space is isolated from running space, can more effectively ensure The safety of computing environment.
It is described above by reference to Fig. 1 and is used to build secured computing environment what TBS or computing device side were executed Method 100.Below with reference to Fig. 2, the computing environment being used for being built on computing device executed in remote validation device side is described The method 200 verified.Similar to method 100, each step described in method 200 can execute in a different order And/or parallel execution.Method 200 can also include the steps that additional step and/or omission execution are shown.
After method 200 starts, at step S202, remote validation device RV can draw with guiding the credible of computing device Storage device (TBS) communication is led, so that the computing environment guided the TBS is verified.Such as described in reference diagram 1, root above According to the preferred embodiment of the present invention, RV is realizing for information about based on TBS to the verification of computing environment.It is specific and Speech can receive the information about TBS at step S202 from the sides TBS, and described information includes but not limited to next or more It is a:The identification information of TBS, the information for the monitor of virtual machine mirror image for including in TBS, the information of OS mirror images, the text for including in TBS The information of part system and the information, etc. of protected application.
In such an embodiment, the sides RV can preserve about it is legal or certification TBS for information about and should The corresponding constraint (for example, for constraint of OS mirror images and/or file system) that TBS should meet.If transmitted information with The information match preserved at RV, and constraint is met accordingly, then and RV is directed to testing for the computing environment that the TBS is guided It demonstrate,proves successfully.It has been begged for above in association with the step S102 in Fig. 1 about the verification performed by TBS identification informations and RV By details are not described herein.
Other than the information about TBS or alternatively, at step S202, RV is also conceivable to other factors pair The computing environment of TBS guiding executes verification.For example, according to some embodiments of the present invention, RV can connect at step S202 Receive other for the information of the user of the currently used TBS, the information for the physical computing devices that TBS is guided, dynamic/generate at random Verification information etc., and whether be trusty based on these information to verify current TBS and by the computing environment of its guiding With safety.The scope of the present invention is not limited in this respect.
Next, at step S204, determines and success is verified whether to computing environment at step S202.If verification is not Success, then method 200 proceeds to step S206, carries out error handle herein.According to the embodiment of the present invention, at step S206 Error handle can based on it is any be currently known or in the future exploitation error handling mechanism.For example, RV can be sent to TBS Indicate the message of authentication failed.For another example, the reason of RV can also indicate authentication failed to TBS.This is only several examples, this The range of invention is not limited in this respect.
On the other hand, if determining that the success to computing environment certification, method 200 proceed to step at step S204 S208 generates security strategy herein.According to the embodiment of the present invention, the security strategy generated herein can be it is predefined, And/or it is dynamically generated according to the design parameter of current computing environment.As described above, the security strategy of RV generations may include For the limitation of application output communication, for example, forbid it is protected apply access after under attack hostile network address, to without Authorized party reveals information, etc..Moreover, the security strategy that RV is generated can include communication security policy, the peace specific to application The combination of full strategy or the two.Specifically, can generate will all have all protected applications in isolation running space The general security strategy of effect, can also according to characteristic, state, requirement of currently running protected application etc. and generate have Targetedly security strategy.
Then, in step S210, the security strategy of generation is transmitted to the sides TBS.As described above, at step S208 by RV generate and be transmitted in step S210 the sides TBS security strategy will be applied in the running environment that TBS is guided every Whole life cycle from the protected application in running space.
Hereafter, certain optional embodiments according to the present invention, method 200 proceed to step S212, are controlled herein by RV Protected application in computing environment and the communication between the external service except the computing environment.As described above, according to this The certain embodiments of invention, the control at step S212 can be realized in this way:Being protected in computing environment Application is protected with the communication between external service using RV as intermediary, and is controlled by it.For example, in some embodiments, step S212 can include these following sub-steps.First, RV can receive protected application for the external service from the sides TBS Request.Hereafter, RV can verify the protected application.According to the embodiment of the present invention, RV is to protected application Verification can be realized based on any any application program verification mechanism for being currently known or developing in the future.For example, RV can be with Identification information, current state, requested operation based on the protected application, if be authorized to use requested external clothes Business etc. various factors verifies the protected application.
If RV is proved to be successful protected application, RV can guide the protected application and the external service It is communicated.For example, RV can indicate protected application:It is allowed directly to be communicated with requested external service.
As described above, at step S212, RV can be by protected application and the verification that is communicated between external service It is executed according to different modes.For example, in some embodiments, protected application and any communication of external service all have to pass through The verification of RV.It is tested it is alternatively possible to only carry out intermediary by RV when a protected application communicates for the first time with an external service Card.In addition, such verification of RV might also depend on the various factors such as period, the feature of external service and information.
It should be appreciated that it is above-described using RV as it is protected application and the intermediary between external service, only with RV controls the preferred embodiment communicated therebetween.Other embodiment is equally possible.For example, in certain alternative implementations In mode, protected application can be communicated according to the preset rules of RV with external service.The scope of the present invention exists It is unrestricted in this respect.
Below with reference to Fig. 3, it illustrates according to embodiment of the present invention by building on the computing device based on safety Calculate the block diagram of the equipment 300 of environment.According to the embodiment of the present invention, equipment 300 may reside in the TBS of guiding computing device On, or it is embodied as a part of TBS.Alternatively or additionally, equipment 300 can also be independently of TBS, and with any appropriate Mode coupled with TBS.The scope of the present invention is not limited in this respect.
According to the embodiment of the present invention, equipment 300 may include communication device 302, is configurable to and remotely tests Device RV communications are demonstrate,proved to verify the computing environment guided by TBS, and for receiving the security strategy generated by RV.According to the present invention Certain embodiments, communication device 302 may include be configured to RV transmission about TBS information for verification dress It sets.Information about TBS may include following one or more:The identification information of TBS, the operating system mirror image for including in TBS Information, the information for the monitor of virtual machine mirror image for including in TBS, the information for the file system for including in TBS and protected The information of application.
According to the preferred embodiment of the present invention, the meter that the communication device 302 of equipment 300 can be guided by means of TBS The software trust calculating base STCB execution loaded in environment is calculated to communicate with remote validation device RV.Note that implementation according to the present invention Mode, communication device 302 can be supported based on the various wired and/or wireless communication equipment for being currently known or developing in the future It makes to be communicated with RV.The scope of the present invention is not limited in this respect.
In addition, as shown in figure 3, further include running space creating device 304 according to the equipment 300 of embodiment of the present invention, It is configurable to create the running space of isolation in the computing environment that TBS is guided for running protected application.According to The preferred embodiment of the present invention, running space creating device 304 may be configured to create such isolation using STCB Running space.
In addition, according to the embodiment of the present invention, equipment 300 further includes strategy implement device 306, is configurable to Security strategy is applied to protected application during the operation of protected application.According to the preferred embodiment of the present invention, tactful Implementation 306 can utilize STCB to apply security strategy to protected application.
Optionally, equipment 300 may include application management device 308, be configurable to make protected application and calculating Communication between the external service of environment is controlled by RV.According to certain embodiments, application management device 308 can be wrapped further It includes:It is configured to make the protected device applied to RV transmission for the request of external service;And it is configured to make protected Apply the device communicated with external service under the guiding of RV.
Below with reference to Fig. 4, it illustrates according to embodiment of the present invention based on verifying and building on the computing device Calculate the block diagram of the validator 400 of the safety of environment.Validator 400 is located in computing device or for guiding computing device TBS's is long-range, therefore also referred to as remote validation device (RV).
According to the embodiment of the present invention, validator 400 includes remote validation device 402, is configurable to and guides The credible bootable storage device TBS communications of computing device, to verify the computing environment that TBS is guided.According to certain optional realities Mode is applied, remote validation device 402 may further include:It is configured to receive the device of the information about TBS;And configuration Device for being verified to computing environment based on the information received.According to some embodiments of the present invention, about TBS Information include following one or more:The identification information of TBS, the information for the operating system mirror image for including in TBS are wrapped in TBS The information of the monitor of virtual machine mirror image contained, the information for the file system for including in TBS and the information of protected application.
In addition, according to the embodiment of the present invention, validator 400 further includes strategy generating device 404, is configurable to Security strategy is generated in response to being proved to be successful, security strategy will be applied during the operation of protected application in a computing environment It is added on protected application.Moreover, validator 400 further includes tactful transmission device 406, it is configurable to transmit generation to TBS Security strategy.According to the embodiment of the present invention, tactful transmission device 406 can be supported to be based on being currently known or open in the future Various wired and/or wireless communication mechanism of hair transmits security strategy to the sides STB.
In addition, certain optional embodiments according to the present invention, validator 400 can also include application control device 408, It is configurable to the communication between the protected application run and its external service in control computing environment.It is according to the present invention Certain embodiments, application control device 408 can further comprise:It is configured to receive protected application for external service The device of request;It is configured to the device verified to protected application;And it is configured in response to protected application Be proved to be successful and guide and protected apply the device that is communicated with external service.
It should be appreciated that the equipment 300 describe above with reference to Fig. 3 can as the entity of method 100 in execution Fig. 1, and It can be as the entity for executing method 200 in Fig. 2 with reference to the validator 400 that figure 4 describes.As a result, above with respect to method 100 and side All features that method 200 describes are equally applicable to equipment 300 and validator 400.
Moreover, it should also be understood that each device in equipment 300 and validator 400 sharp can in various manners be realized, wrap Include software, hardware, firmware or its arbitrary combination.For example, in some embodiments, it is each in equipment 300 and validator 400 Device can be realized using software and/or firmware module.In addition, these devices can also be realized using hardware module.Example Such as, application-specific integrated circuit (ASIC) or system on chip (SOC) may be implemented in the device in equipment 300 and validator 400.Now Known or exploitation in the future other modes are also feasible, and the scope of the present invention is not limited in this respect.
Referring now to Figure 5, it illustrates the block diagrams according to the exemplary system 500 of embodiment of the present invention.Note that scheming In 5 example, the equipment for creating secured computing environment can be realized (as a result, by the equipment 300 described above with reference to Fig. 3 For convenience, it is referred to as in following discussion " equipment 300 "), and remote validation device RV can be by above shown in Fig. 5 It is realized with reference to the validator 400 that figure 4 describes.It shall yet further be noted that although equipment 300 is shown to include in TBS in Figure 5, This is only exemplary.As described above, equipment 300 and TBS can have various coupled relations.It is retouched below with reference to Fig. 5 It states and how to build safe computing environment on the computing device that TBS is guided in embodiments of the present invention.
First, when credible bootable storage device TBS is coupled or be connected to some computing device by user, the TBS Computing device is guided (S502) using its own internal storage device.In response to the guiding of TBS, in the computing device Hardware environment on, software environment is created.The software environment at least may include:Operating system OS, software trust calculate Base STCB.Software environment and hardware environment together form the computing environment guided by TBS.
At this point, the communication device (referring to Fig. 3) in equipment 300 can be communicated with remote validation side RV (preferably, by means of STCB), to verify the computing environment (S504) that TBS is guided.RV according to receive information (such as it is described above about The information of TBS) computing environment is verified.In response to being proved to be successful, RV generates security strategy, and is returned to TBS/ Computing device side (S506).As shown in figure 5, in illustrative preferred embodiment, the communication device in equipment 300 still may be used To receive the security strategy using STCB.
Then, the running space creating device in equipment 300 is preferably by STCB structures (referring to Fig. 3) for protected The isolation running space of application, and the security strategy received from RV is applied to the whole life cycle of protected application (S508)。
Hereafter, optionally, if protected application expectation is communicated with applications, which will be controlled by RV.Specifically, According to certain embodiments, equipment 300 can make protected application that will be sent to RV (S510) for the request of external service.RV Protected application is verified, and guides the request of protected application to as target in the case where being proved to be successful External service (S512).Hereafter, protected application can under the guiding of RV with applications direct communication (S514).
Referring now to Figure 6, it illustrates suitable for the schematic of the computer system 600 for putting into practice embodiment of the present invention Block diagram.For example, computer system 600 shown in Fig. 6 can be used for realizing the above-described computing device guided by TBS. As shown in fig. 6, computer system may include:CPU (central processing unit) 601, RAM (random access memory) 602, ROM (read-only memory) 603, system bus 604, hard disk controller 605, keyboard controller 606, serial interface controller 607, simultaneously Line interface controller 608, display controller 609, hard disk 610, keyboard 611, serial peripheral equipment 612, concurrent peripheral equipment 613 With display 614.In such devices, what is coupled with system bus 604 has CPU 601, RAM 602, ROM 603, hard disk control Device 605, keyboard controller 606, serialization controller 607, parallel controller 608 and display controller 609 processed.Hard disk 610 with it is hard Disk controller 605 couples, and keyboard 611 is coupled with keyboard controller 606, serial peripheral equipment 612 and serial interface controller 607 Coupling, concurrent peripheral equipment 613 is coupled with parallel interface controller 608 and display 614 is coupled with display controller 609. It should be appreciated that the structure diagram described in Fig. 6 is shown for illustrative purposes only, rather than to the limit of the scope of the invention System.In some cases, it can increase or reduce certain equipment as the case may be.
It should be appreciated that in addition to hardware embodiment, embodiments of the present invention can pass through computer program product Form is realized.For example, can pass through computer program with reference to the method 100 that figure 1 describes and with reference to the method 200 that figure 2 describes Product is realized.The computer program product can be stored in RAM 604 for example shown in fig. 6, ROM 604, hard disk 610 and/ Or in any storage medium appropriate, or downloaded in computer system 600 from position appropriate by network.Computer journey Sequence product may include computer code part comprising can be by processing equipment appropriate (for example, CPU shown in Fig. 6 601) program instruction executed.According to the embodiment of the present invention, described program instruction at least may include for realizing method 100 and method 200 in each step executable instruction.
Several specific implementation modes through the invention illustrate the thought and principle of the present invention in detail above.Pass through Above description is appreciated that according to the embodiment of the present invention, can utilize local both mechanism and long-range mechanism, from different Aspect ensures the safety of computing environment.Moreover, according to the embodiment of the present invention, security strategy will be in protected software application Whole life cycle in be carried out.In addition, protected application may also pass through additional the with the communication between external service Tripartite verifies.Remote validation when being started as a result, by computing environment, isolation running space when the operation of protected application to protecting Shield and the local of telesecurity strategy are implemented, it is ensured that and improve the safety of created computing environment.
Note that in above-described flow chart and block diagram, each frame can represent the portion of module, program segment or code Point, the part of these module, program segment, or codes includes one or more executable fingers for implementing the specified logical function It enables.It shall yet further be noted that in certain alternate embodiments, the function of being marked in frame can also be according to different from shown in figure suitable Sequence occurs.For example, two boxes succeedingly indicated can essentially be basically executed in parallel, they sometimes can also be by opposite Sequence execute, this depend on involved concrete function.It shall yet further be noted that each frame and frame in block diagram and or flow chart The combination of figure and/or the box in flow chart can use the dedicated hardware based system of functions or operations as defined in executing It realizes, or can realize using a combination of dedicated hardware and computer instructions.
Complete hardware embodiment, complete software embodiment party can be taken according to the method and apparatus of embodiment of the present invention Formula had not only included hardware component but also had included the form of the embodiment of component software.In a preferred embodiment, the present invention realizes For software comprising but be not limited to firmware, resident software, microcode etc..
Moreover, of the invention can also take can computer program production available from computer or computer-readable medium access The form of product, these media provide program code so that computer or any instruction execution system use or in connection. For the purpose of description, computer can be used or computer-readable mechanism can be any tangible device, can include, store, Communicate, propagate, or transport program with by instruction execution system, device or equipment use or it is in connection.
Medium can be electric, magnetic, light, electromagnetism, infrared ray or semiconductor system (or device or device) Or propagation medium.The example of computer-readable medium include semiconductor or solid-state memory, tape, removable computer diskette, Random access storage device (RAM), read-only memory (ROM), hard disc and CD.The example of CD includes compact disk-at present Read memory (CD-ROM), compact disk-read/write (CD-R/W) and DVD.
It is suitble to the data processing system of storage/or execution program code include at least one processor, directly Or memory component is indirectly couple to by system bus.Memory component may include the practical execution phase in program code Between utilized local storage, mass storage and provide the interim storage of at least part program code to subtract The cache memory of the number of code must be fetched during few execution from mass storage.
Input/output or I/O equipment (including but not limited to keyboard, display, pointer device etc.) can directly or It is coupled to system by intermediate I/O controllers.
Network adapter can also be coupled to system, so that data processing system can pass through the private or public of centre Network and be coupled to other data processing systems or remote printer or storage device.Modem, cable modem And Ethernet card is only several examples of currently available types of network adapters.
Although having had been described above several embodiments of the present invention, it should be appreciated to those skilled in the art that this A little descriptions be merely exemplary with it is illustrative.According to the introduction and enlightenment of specification, true spirit of the present invention is not being departed from In the case of, embodiments of the present invention can be carry out various modifications and be changed.Therefore, the feature described in specification should not be by It is considered restrictive.The scope of the present invention is defined solely by the appended claims.

Claims (20)

1. a kind of method for building safe computing environment on the computing device, the computing device is deposited by credible may be guided Equipment TBS guiding is stored up, the method includes:
It is communicated with remote validation device RV to verify the safe calculating ring on the computing device guided by the TBS Border;
In response to the good authentication of the safe computing environment on the computing device that guides the TBS, receive by The security strategy that the RV is remotely generating, wherein the security strategy is the one or more according to the safe computing environment Parameter and it is that dynamic generates and be configured as being performed in the safe computing environment on said computing device;
It is protected for running that the running space of isolation is created in the safe computing environment on said computing device Using;And
During the operation of the protected application in the safe computing environment on said computing device, by the RV The security strategy being remotely generating is applied to the protected application;
The wherein described security strategy calculates base (STCB) to receive and execute by the software trust in the safe computing environment To create the running space of the isolation.
2. according to the method described in claim 1, wherein being communicated with remote validation device RV to verify the calculating guided by the TBS Environment further comprises:
It is verified to RV transmission about the information of the TBS.
3. according to the method described in claim 2, including wherein following one or more about the information of the TBS:The TBS Identification information, the status information for the operating system mirror image for including in the TBS, the monitor of virtual machine for including in the TBS The information of mirror image, the information for the file system for including in the TBS and the information of the protected application.
4. according to the method described in claim 1, further comprising:
The communication between the protected application and the external service of the computing environment is set to be controlled by the RV.
5. according to the method described in claim 4, wherein make the protected application and the external service of the computing environment it Between communication be controlled by the RV and further comprise:
Make the protected request applied to RV transmission for the external service;And
In response to the request by the RV good authentications, make it is described it is protected apply under the guiding of the RV with the outside Communication for service.
6. a kind of method for verifying the safety of the computing environment built on the computing device, the computing device is by credible Bootable storage device TBS guiding, the method includes:
It is communicated with the TBS to verify the computing environment on the computing device guided by the TBS;
Security strategy is remotely generating in response to described be proved to be successful, the security strategy is configured as on said computing device The computing environment in protected application operation during be applied in the protected application, wherein the security strategy It is one or more parameters according to the computing environment and dynamic generates;And
The security strategy being remotely generating is transmitted to the TBS.
7. further comprising according to the method described in claim 6, wherein verifying the computing environment guided by the TBS:
Receive the information about the TBS;And
The computing environment is verified based on the described information received.
8. according to the method described in claim 7, including wherein following one or more about the information of the TBS:The TBS Identification information, the information for the operating system mirror image for including in the TBS, the monitor of virtual machine mirror image for including in the TBS Information, the information for the file system for including in the TBS and the information of the protected application.
9. according to the method described in claim 6, further comprising:
Control the communication between the protected application and the external service of the computing environment.
10. according to the method described in claim 9, wherein controlling the external service of the protected application and the computing environment Between communication further comprise:
Receive the request that the protected application is directed to the external service;
The protected application is verified;And
In response to being proved to be successful to the protected application, the guiding protected application is led to the external service Letter.
11. a kind of equipment for building safe computing environment on the computing device, the computing device is by credible bootable Storage device TBS guiding, the equipment include:
Communication device is configured to be communicated with remote validation device RV to verify on the computing device guided by the TBS The safe computing environment, and on the computing device in response to guiding the TBS it is described it is safe based on The good authentication of environment is calculated, the security strategy being remotely generating by the RV is received, wherein the security strategy is according to the peace One or more parameters of full computing environment and it is that dynamic generates and be configured as the peace on said computing device It is performed in full computing environment;
Running space creating device is configured to create isolation in the safe computing environment on said computing device Running space is for the protected application of operation;And
Strategy implement device, be configured in the safe computing environment on said computing device described protected answers During operation, the security strategy being remotely generating is applied to the protected application;
The wherein described security strategy calculates base (STCB) to receive and execute by the software trust in the safe computing environment To create the running space of the isolation.
12. equipment according to claim 11, wherein the communication device further comprises:
Be configured to the RV transmission about the TBS information for verification device.
13. equipment according to claim 12, wherein the information about the TBS includes following one or more:It is described The identification information of TBS, the information for the operating system mirror image for including in the TBS, the monitor of virtual machine mirror for including in the TBS The information of picture, the information for the file system for including in the TBS and the information of the protected application.
14. equipment according to claim 11, further comprises:
Application management device, be configured to make communication between the protected application and the external service of the computing environment by It controls in the RV.
15. equipment according to claim 14, wherein the application management device further comprises:
It is configured to make the protected device applied to RV transmission for the request of the external service;And
It is configured to be made by the RV good authentications in response to the request described protected apply under the guiding of the RV The device communicated with the external service.
16. it is a kind of for verify the computing environment built on the computing device safety validator, the computing device by Credible bootable storage device TBS guiding, and the validator is located in the long-range of the computing device, the validator packet It includes:
Remote validation device is configured to be communicated with the TBS to verify the institute on the computing device guided by the TBS State computing environment;
Strategy generating device is configured to be remotely generating security strategy in response to described be proved to be successful, the security strategy quilt Described protected is applied in during the operation for the protected application being configured in the computing environment on said computing device Shield application, wherein the security strategy is one or more parameters according to the computing environment and dynamic generates;And
Tactful transmission device is configured to transmit the security strategy being remotely generating to the TBS.
17. validator according to claim 16, wherein the remote validation device further comprises:
It is configured to receive the device of the information about the TBS;And
It is configured to the device verified to the computing environment based on the described information received.
18. validator according to claim 17, wherein the information about the TBS includes following one or more:Institute State the identification information of TBS, the information for the operating system mirror image for including in the TBS, the monitor of virtual machine for including in the TBS The information of mirror image, the information for the file system for including in the TBS and the information of the protected application.
19. validator according to claim 16, further comprises:
Application control device is configured to control the outer of the protected application that is run in the computing environment and the computing environment Communication between portion's service.
20. validator according to claim 19, wherein the application control device further comprises:
It is configured to receive the device of request of the protected application for the external service;
It is configured to the device verified to the protected application;And
It is configured in response to guiding protected being proved to be successful for application the protected application and the external clothes The device that business is communicated.
CN201110166629.XA 2011-06-13 2011-06-13 Method and apparatus for building safe computing environment Active CN102833296B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110166629.XA CN102833296B (en) 2011-06-13 2011-06-13 Method and apparatus for building safe computing environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110166629.XA CN102833296B (en) 2011-06-13 2011-06-13 Method and apparatus for building safe computing environment

Publications (2)

Publication Number Publication Date
CN102833296A CN102833296A (en) 2012-12-19
CN102833296B true CN102833296B (en) 2018-10-23

Family

ID=47336266

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110166629.XA Active CN102833296B (en) 2011-06-13 2011-06-13 Method and apparatus for building safe computing environment

Country Status (1)

Country Link
CN (1) CN102833296B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3026558A1 (en) * 2014-11-28 2016-06-01 Thomson Licensing Method and device for providing verifying application integrity
EP3026557A1 (en) * 2014-11-28 2016-06-01 Thomson Licensing Method and device for providing verifying application integrity
US10248791B2 (en) * 2015-07-20 2019-04-02 Intel Corporation Technologies for secure hardware and software attestation for trusted I/O
DE102016009232A1 (en) * 2016-07-28 2018-02-01 Giesecke+Devrient Mobile Security Gmbh Integrated subscriber identity module with core OS and application OS

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101176100A (en) * 2005-05-13 2008-05-07 英特尔公司 Methods and apparatus for generating endorsement credentials for software-based security coprocessors
CN101334824A (en) * 2007-04-11 2008-12-31 趋势科技公司 Portable secured computing environment for performing online confidential transactions in untrusted computers

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001025932A1 (en) * 1999-10-01 2001-04-12 Infraworks Corporation Back-channeling in a memory vault system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101176100A (en) * 2005-05-13 2008-05-07 英特尔公司 Methods and apparatus for generating endorsement credentials for software-based security coprocessors
CN101334824A (en) * 2007-04-11 2008-12-31 趋势科技公司 Portable secured computing environment for performing online confidential transactions in untrusted computers

Also Published As

Publication number Publication date
CN102833296A (en) 2012-12-19

Similar Documents

Publication Publication Date Title
TWI648649B (en) Mobile communication device and method of operating same
CN106687980B (en) Management program and virtual machine protection
TWI674533B (en) Apparatus of authorizing an operation to be performed on a targeted computing device
US10650139B2 (en) Securing temporal digital communications via authentication and validation for wireless user and access devices with securitized containers
US9871821B2 (en) Securely operating a process using user-specific and device-specific security constraints
TWI662432B (en) Mobile communication device and method of operating thereof
CN102567662B (en) For processing the apparatus and method of data
CN103353931B (en) Security-enhanced computer system and method
EP3047375B1 (en) Virtual machine manager facilitated selective code integrity enforcement
CN108351937A (en) Computing device
CN109313690A (en) Self-contained encryption boot policy verifying
US11436305B2 (en) Method and system for signing an artificial intelligence watermark using implicit data
CN107077567A (en) Identify the secure border on computing device
CN102833296B (en) Method and apparatus for building safe computing environment
CN108595983A (en) A kind of hardware structure and application context integrity measurement method based on hardware security isolated execution environment
EP3338214B1 (en) Secure computation environment
US11520859B2 (en) Display of protected content using trusted execution environment
CN104052602B (en) Method and apparatus for single-sign-on
US11775347B2 (en) Method for implanting a watermark in a trained artificial intelligence model for a data processing accelerator
US11443243B2 (en) Method and system for artificial intelligence model training using a watermark-enabled kernel for a data processing accelerator
US11645116B2 (en) Method and system for making an artificial intelligence inference using a watermark-enabled kernel for a data processing accelerator
US11740940B2 (en) Method and system for making an artifical intelligence inference using a watermark-inherited kernel for a data processing accelerator
EP3935538A1 (en) Secure policy ingestion into trusted execution environments
CN112650988A (en) Method and system for encrypting data using kernel
US11475140B1 (en) Enclave-based cryptography services in edge computing environments

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20200408

Address after: Massachusetts, USA

Patentee after: EMC IP Holding Company LLC

Address before: Massachusetts, USA

Patentee before: EMC Corp.

TR01 Transfer of patent right